Open Access. Powered by Scholars. Published by Universities.®

Science and Technology Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

Algorithm

Faculty of Engineering and Information Sciences - Papers: Part B

Publication Year

Articles 1 - 2 of 2

Full-Text Articles in Science and Technology Studies

Formulation Of A Model Predictive Control Algorithm To Enhance The Performance Of A Latent Heat Solar Thermal System, Gianluca Serale, Massimo Fiorentini, Alfonso Capozzoli, Paul Cooper, Marco Perino Jan 2018

Formulation Of A Model Predictive Control Algorithm To Enhance The Performance Of A Latent Heat Solar Thermal System, Gianluca Serale, Massimo Fiorentini, Alfonso Capozzoli, Paul Cooper, Marco Perino

Faculty of Engineering and Information Sciences - Papers: Part B

Model predictive control has proved to be a promising control strategy for improving the operational performance of multi-source thermal energy generation systems with the aim of maximising the exploitation of on-site renewable resources. This paper presents the formulation and implementation of a model predictive control strategy for the management of a latent heat thermal energy storage unit coupled with a solar thermal collector and a backup electric heater. The system uses an innovative Phase Change Material slurry for both the heat transfer fluid and storage media. The formulation of a model predictive controller of such a closed-loop solar system is …


Obfuscating Re-Encryption Algorithm With Flexible And Controllable Multihop On Untrusted Outsourcing Server, Mingwu Zhang, Yan Jiang, Yi Mu, Willy Susilo Jan 2017

Obfuscating Re-Encryption Algorithm With Flexible And Controllable Multihop On Untrusted Outsourcing Server, Mingwu Zhang, Yan Jiang, Yi Mu, Willy Susilo

Faculty of Engineering and Information Sciences - Papers: Part B

An outsourcing re-encryption program can help a ciphertext owner (delegator) transform his/her ciphertext into another ciphertext of delegatee. For example, an e-mail receiver can re-transfer an encrypted e-mail to his secretary while allowing the e-mail to be readable for her. For a multi-hop re-encryption, the delegatee can re-encrypt the ciphertext to another user in delegation chain, repeatedly. Traditionally, this transformation is usually conducted by a proxy or an outsourcing server. However, the proxy or outsourcing server needs a re-encryption key (i.e., re-key) and the re-encryption program must execute in a black-box manner (cannot trace into or debug and monitor the …